Data detection method and data detector for signals transmitted over a communication channel with inter-symbol interference
09722691 · 2017-08-01
Assignee
Inventors
- Giulio Colavolpe (Parma, IT)
- Andrea Modenini (Parma, IT)
- Amina Piemontese (Monte Sant'Angelo-Foggia, IT)
- Nader Alagha (Wassenaar, NL)
Cpc classification
H04B1/10
ELECTRICITY
H04L25/03171
ELECTRICITY
International classification
H04B1/10
ELECTRICITY
H04L25/03
ELECTRICITY
H04B7/185
ELECTRICITY
Abstract
A data detection method, having the steps of: a. receiving a signal transmitted over a communication channel, the signal being representative of at least a stream of interfering symbols x.sub.k, each representing one or more bits of a transmitted message; b. filtering the received signal through at least a filter bank having at least a first filter representative of a linear response of the channel and a second filter representative of a non-linear response of the channel, and sampling the filtered signals at the symbol rate, thus obtaining respective sequences of filtered samples r.sub.k.sup.(1) r.sub.k.sup.(3); and c. jointly computing the a posteriori probabilities of N>1 consecutive symbols x.sub.k. A data detector for carrying out such a method, and a method of transmitting data over a nonlinear channel, optimizing spectral efficiency when data detection is performed using such a method is also provided.
Claims
1. A data detection method, comprising the steps of: a. receiving a signal transmitted over a communication channel, said signal being representative of at least a stream of interfering symbols x.sub.k, each representing one or more bits of a transmitted message; b. filtering the received signal through at least a filter bank comprising at least a first filter representative of a linear response of said channel and a second filter representative of a non-linear response of said channel, and sampling the filtered signals at the symbol rate, thus obtaining respective sequences of filtered samples r.sub.k.sup.(1), r.sub.k.sup.(3); and c. jointly computing the a posteriori probabilities of N>1 consecutive symbols x.sub.k by applying the sum-product algorithm to a probability mass function expressed by the product of N terms, each being associated to a symbol x.sub.k and being proportional to the product of an indicator function, an a priori probability, a first function representing the inter-symbol interference due to the Q symbols which precede said symbol x.sub.k and of a second function representing the inter-symbol interference due to the (L−Q) symbols immediately preceding said Q symbols which precede symbol x.sub.k; where: L is an integer greater than zero, representing the memory of the communication channel; Q is an integer greater than zero and not greater than L, serving as a design parameter; thus realizing simultaneous soft-input-soft-output detection of a packet of N symbols of the transmitted message, and wherein said probability mass function is expressed by:
h.sub.i.sup.(1)=∫.sub.−∞.sup.∞g.sup.(1)(t)g.sup.(1)*(t−iT)dt;
h.sub.i.sup.(3)=∫.sub.−∞.sup.∞g.sup.(3)(t)g.sup.(3)*(t−iT)dt;
h.sub.i.sup.(1,3)=∫.sub.−∞.sup.∞g.sup.(3)(t)g.sup.(1)*(t−iT)dt;
g.sup.(3)(t)=¾γ.sub.3
2. A data detection method according to claim 1, wherein said second filter is representative of a third-order contribution to the nonlinear response of said channel.
3. A data detection method according to claim 2, wherein said or each said filter bank comprises one or more additional filters representative of higher-order contributions to the nonlinear response of said channel and providing respective sequences of filtered samples.
4. A data detection method according to claim 1, wherein L is lower than N.
5. A data detection method according to claim 1, wherein Q is lower than L.
6. A data detection method according to claim 1, further comprising an interference cancellation step comprising subtracting from said sequences of filtered samples an estimated contribution from symbols x.sub.k−i with i>L before performing said step c.
7. A data detection method according to claim 6 wherein said interference cancellation step comprises soft interference cancellation performed by estimating and subtracting from said sequences of filtered samples an average contribution from symbols x.sub.k−i with i>L.
8. A data detection method according to claim 1, further comprising a step of performing channel-shortening filtering of said sequences of filtered samples using a k-dimensional filter, k being the number of sequences, said step being performed before step c.
9. A data detection method according to claim 1, wherein said transmitted message is encoded, the method being carried out iteratively by, at each iteration: performing said steps a. and c.; providing said a posteriori probabilities to a soft-input-soft-output decoder; obtaining extrinsic information from said soft-input-soft-output decoder and using it to determine a priori probabilities for the subsequent iteration.
10. A multi-user data detection method according to claim 1, wherein said signal is representative of a plurality of streams of symbols, each symbol representing one or more bits of a respective transmitted message, each said stream being transmitted over a respective communication channel using a respective carrier; and wherein said step c. is carried out by applying the sum-product algorithm to a probability mass function expressed by the product of N×U terms, each of said terms being associated to a symbol x.sub.k,l and proportional to the product of an indicator function, an a priori probability, a first function representing the inter-symbol interference within carrier l due to the Q symbols which precede said symbol x.sub.k,l, of a second function representing the inter-symbol interference within carrier l due to the (L−Q) symbols immediately preceding said Q symbols which precede symbol x.sub.k,l; and of a third function representative of inter-carrier interference, U>1 being the number of interfering carriers, thus realizing simultaneous soft-input-soft-output detection of U packets of N symbols.
11. A multi-user data detection method according to claim 10 wherein said probability mass function is expressed by:
12. A data detection method according to claim 1, wherein said or each said communication channel is a satellite channel.
13. A multiuser data detection method according to claim 10, wherein said communication channels are satellite channel comprising a separate nonlinear transponder for each said carrier.
14. A data detector comprising: at least a filter bank comprising at least a first filter representative of a linear response of a communication channel and a second filter representative of a non-linear response of said channel; a sampler for sampling the outputs of said filters at a symbol rate of a received signal, thus obtaining respective sequences of filtered samples r.sub.k.sup.(1), r.sub.k.sup.(3); and a processor for taking said sequences of filtered samples as inputs and realizing simultaneous soft-input-soft-output detection of a packet of N interfering symbols x.sub.k by applying the sum-product algorithm to a probability mass function expressed by the product of N terms, each being associated to a symbol x.sub.k and being proportional to the product of an indicator function, an a priori probability, a first function representing the inter-symbol interference due to the Q symbols which precede said symbol x.sub.k and of a second function representing the inter-symbol interference due to the (L−Q) symbols immediately preceding said Q symbols which precede symbol x.sub.k; where: L is an integer greater than zero, representing the memory of the communication channel; Q is an integer greater than zero and not greater than L, serving as a design parameter; thus realizing simultaneous soft-input-soft-output detection of a packet of N symbols of the transmitted message, and wherein said probability mass function is expressed by:
h.sub.i.sup.(1)=∫.sub.−∞.sup.∞g.sup.(1)(t)g.sup.(1)*(t−iT)dt;
h.sub.i.sup.(3)=∫.sub.−∞.sup.∞g.sup.(3)(t)g.sup.(3)*(t−iT)dt;
h.sub.i.sup.(1,3)=∫.sub.−∞.sup.∞g.sup.(3)(t)g.sup.(1)*(t−iT)dt;
g.sup.(3)(t)=¾γ.sub.3
15. A data detector according to claim 14 further comprising an interference canceller for subtracting from said sequences of filtered samples an estimated contribution from symbols x.sub.k−i with i>L before performing said step c.
16. A data detector according to claim 14 further comprising a k-dimensional channel-shortening filter taking said sequences of filtered samples as input and providing filtered outputs to said processor or to said interference canceller, k being the number of sequences.
17. A data detector according to claim 14 further comprising a soft-input-soft-output decoder iteratively exchanging extrinsic information with said processor.
18. A multi-user data detector according to claim 14, comprising: a plurality of filter banks associated to respective transmission channels, each comprising at least a first filter representative of a linear response of a communication channel and a second filter representative of a non-linear response of said channel; a sampler for sampling the outputs of said filters at a symbol rate of a received signal, thus obtaining respective sequences of filtered samples; and a processor for taking said sequences of filtered samples as inputs and realizing simultaneous soft-input-soft-output detection of U packets of N symbols x.sub.k,l by applying the sum-product algorithm to a probability mass function expressed by the product of N×U terms, each being associated to a symbol x.sub.k,l and being proportional to the product of an indicator function, an a priori probability, a first function representing the inter-symbol interference within carrier l due to the Q symbols which precede said symbol x.sub.k,l, of a second function representing the inter-symbol interference within carrier l due to the (L−Q) symbols immediately preceding said Q symbols which precede symbol x.sub.k,l; and of a third function representative of inter-carrier interference, wherein: L is an integer greater than zero, representing the memory of the communication channel; Q is an integer greater than zero and not greater than L, serving as a design parameter; and U>1 is the number of interfering carriers.
19. A multi-user data detector according to claim 18 wherein said probability mass function is expressed by:
20. A method of transmitting data over a communication channel by modulating at least one carrier using a succession of pulses having a same shape and a complex amplitude chosen among a discrete set of allowed values defining a finite-order constellation, the method being characterized in that at least one parameter chosen between a bandwidth of said pulses, a shape of said pulses and a temporal spacing between said pulses is chosen so as to maximize spectral efficiency when detection is performed using a method according to claim 1.
21. A method according to claim 20 wherein said communication channel is a satellite channel.
22. A method according to claim 20 comprising modulating a plurality of carriers with respective succession of said pulses, a frequency separation between said carriers being chosen so as to maximize spectral efficiency when detection is performed using a method according to claim 10, and transmitting said modulated carriers over respective communication channels.
23. A method according to claim 22, wherein said respective communication channels are satellite channel comprising a separate nonlinear transponder for each said carrier.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1)
(2)
(3)
(4)
(5)
(6)
(7)
(8)
DETAILED DESCRIPTION
(9) The present invention will be described with reference to a frequency-division-multiplexed satellite communication system, whose block diagram is illustrated on
(10) Several pulse sequences, generated by several independent users and modulating respective carriers, are then transmitted over a satellite channel. At the receiving end, after a demodulation step, which is not represented, the received signal corresponding to a user is filtered by a front-end filter and sampled. The samples are provided as inputs to a detector/decoder whose structure and operation will be described below. Moreover, each detector/decoder exchanges information with the detectors/decoders for “adjacent users”, i.e. for adjacent carriers.
(11) Without loss of generality, it is possible, as an example and for illustrative purposes only, to consider perfectly synchronized (forward link assumption) adjacent users employing a same linear modulation format, shaping pulse p(t), and symbol interval (or time spacing) T. The transmitted signal can be expressed as
(12)
(13) where x.sub.n,l is the symbol transmitted over the lth channel during the nth symbol interval, and F.sub.u the frequency spacing between adjacent channels (in the computation of the spectral efficiency, F.sub.u can be used as a measure of the signal bandwidth for the uplink). The transmitted symbols {x.sub.n,l} are independent and uniformly distributed and belong to a given zero-mean M-ary complex constellation X.
(14) In the DVB-S2 standard, the base pulse p(t) has RRC-shaped spectrum (RRC pulse in the following) with roll-off factor α. The technique described here applies to general pulses, not necessarily band-limited or satisfying the Nyquist criterion for the absence of ISI for some given value of the symbol interval.
(15) The satellite channel comprises a satellite transponder for each carrier occupying the entire transponder bandwidth (single-channel-per-transponder). The on-board high power amplifier (HPA) can operate close to saturation and hence with high efficiency, but has a nonlinear response. An Input Multiplexer (IMUX) filter selects only one carrier, and different carriers are amplified by different transponders. An Output Multiplexer (OMUX) filter reduces then the out-of-band power due to the spectral regrowth after nonlinear amplification (see
(16) In this single-channel-per-transponder scenario, the useful signal at the user terminal is the sum of independent contributions, one for each user, although these contributions are no more, rigorously, linearly modulated due to the nonlinear transformation of the on-board HPA.
(17) If time packing is used, the symbol interval T is shorter than the value ensuring orthogonal signalling, and therefore ISI is present. In any case, some ISI is necessarily introduced by the nonlinear response of the transponder and the presence of IMUX and OMUX filters. Moreover, frequency separation F.sub.u,F.sub.d can be lower than the channel bandwidth, thus introducing some inter-carrier interference (ICI).
(18) An alternative scenario would be the so-called “multiple-channel-per-transponder”, where a single transponder amplifies several carriers, and nonlinearity introduces additional ICI.
(19) The inventive data detection method only applies to the “single-channel-per-transponder” scenario, considering two cases: single-user receiver and multiple-user receiver. In the “multiple-channel-per-transponder” scenario detection can be performed using alternative methods known from the prior art, e.g. [11] for single-user receivers and [12] for multiple-users receivers.
(20) The single-user receiver, single-channel-per-transponder embodiment of the invention will be considered first, due to its lower complexity as only ISI (both linear and nonlinear) has to be considered. Assuming that all adjacent channels will be removed by the IMUX filter (or their interference neglected), the signal at the transponder input is:
(21)
(22) where x.sub.k is the symbol transmitted during the kith symbol interval by user l=0 (that is x.sub.k,l=x.sub.k,0). The starting point to derive a low-complexity SISO detection algorithm is the approximate signal model described in [13], which is based on an approximate Volterra-series expansion of the satellite channel. This model will be briefly revised. The impulse response of the system up to the HPA is defined as h(t)=p(t)h.sub.i(t), where symbol
denotes “convolution” and h.sub.i(t) is the input response of the IMUX. The signal at the HPA output can be expressed as a function of x(t) by using a polynomial expansion in which only odd-order terms appear [14]. The signal is then filtered through the OMUX filter with input response h.sub.o(t). As well-known in the literature, the signal s(t) at the transponder output can be expressed using a third order nonlinearity model as
(23)
(24) The functions γ.sub.1h.sup.(1)(t) and
(25)
are to me so-called Volterra kernels of first and third order, respectively. In [13], an approximate Volterra representation is used to simplify the signal expression at the transponder output. The approximation consists of holding only the terms in the form x.sub.p|x.sub.q|.sup.2 among the 3-symbols products x.sub.i.x.sub.j.x.sub.l* which appear in the polynomial expansion (2), and using the approximation |x.sub.p|.sup.2=E{|x.sub.p|.sup.2} when p≠q. The signal thus becomes
(26)
(27) and I(t) is an indicator equal to one when t=0, zero otherwise.
(28) Without loss of generality, perfect frequency, phase, and timing synchronization will be considered as an example and for illustrative purposes only. Assuming ideal synchronization, the low-pass equivalent of the received signal can be written as [30]
r(t)=s(t)+w(t) (4)
(29) where s(t) is given in (3) and w(t) is a zero-mean circularly-symmetric Gaussian process with power spectral density 2N.sub.0. The receiver is assumed to perfectly know the pulses g.sup.(1) (t) and g.sup.(3)(t) and the value of N.sub.0. It is assumed that the user transmits a packet of N symbols, which are collected into vector x={x.sub.0, . . . , x.sub.N−1}.
(30) Let r be a proper set of sufficient statistics, extracted from the received signal, collected in a vector of proper length. The joint maximum-a-posteriori (MAP) detection of symbols {x.sub.n} requires the evaluation of the a-posteriori probabilities (APPs) P(x.sub.n|r). The probability mass function of the transmitted sequence can be factorized as
(31)
(32) where P.sub.n(x.sub.n) is the a priori probability that the symbol x.sub.n is transmitted with index n. The conditional probability density function of r given the modulation symbols x is
(33)
(34) Substituting (3) in (6) and defining the following coefficients:
h.sub.i.sup.(1)=∫.sub.−∞.sup.∞g.sup.(1)(t)g.sup.(1)*(t−iT)dt
h.sub.i.sup.(3)=∫.sub.−∞.sup.∞g.sup.(3)(t)g.sup.(3)*(t−iT)dt
h.sub.i.sup.(1,3)=∫.sub.−∞.sup.∞g.sup.(3)(t)g.sup.(1)*(t−iT)dt
r.sub.i.sup.(1)=∫.sub.−∞.sup.∞r(t)g.sup.(1)*(t−iT)dt (7)
r.sub.i.sup.(3)=∫.sub.−∞.sup.∞r(t)g.sup.(3)*(t−iT)dt (8)
(35) after straightforward manipulations and assuming that the memory of the channel is of L symbols (that is, h.sub.i.sup.(1)=0, h.sub.i.sup.(3)=0, and h.sub.i.sup.(1,3)=0, for |i|>L) (6) can be expressed as
(36)
(37) where Q≦L is a design parameter (an arbitrary integer) and Re{•} denotes the real component of a complex number.
(38) When time packing is employed, the assumption h.sub.i.sup.(1)=0, h.sub.i.sup.(3)=0, and h.sub.i.sup.(1,3)=0, for |i|>L is not rigorously true, since the memory is theoretically infinite. In this case, L assumes the meaning of memory considered by the receiver since the ISI of the farthest symbols is not taken into account.
(39) In equation (9), border effects are managed by assuming that symbols x are preceded by at least L known or zero symbols. From (9), it is clear that a possible sufficient statistic for this detection problem is thus represented by the sequences of samples {r.sub.k.sup.(1)} and {r.sub.k.sup.(3)}. These sequences represent a bank of two filters (see
(40) An idea at the heart of the present invention is to design a detection algorithm, that works as a FBA (Forward-Backward Algorithm) for Q nearest interfering symbols, hence with complexity exponential in Q, but can also take into account the older L−Q symbols in a novel fashion, with complexity linear in L−Q, and, eventually, the remaining interfering symbols in a further simplified fashion. Therefore, design parameter Q determines the trade-off between performance (in terms of symbol error rate) and complexity.
(41) Defining a trellis state σ.sub.k=(x.sub.k−1, . . . , x.sub.k−Q) and the corresponding vector σ={σ.sub.0 . . . , σ.sub.N}, the following factorization can be obtained
P(x,σ|.sub.r)∝p(r|x,σ)P(o|x)P(x)=p(r|x)P(σ|x)P(x).
From the state definition it follows that the state in a generic time instant is completely determined by the previous state and the symbol transmitted in the previous interval, and hence the probability P(σ|x) can be factorized as
(42)
where I.sub.k(σ.sub.k+1, σ.sub.k, x.sub.k) is the trellis indicator function, equal 1 if the next state σ.sub.k+1 is compatible with the current state σ.sub.k and the symbol x.sub.k. By using (5) and (9) and introducing the functions
(43)
the probability mass function P(x, σ|r) can be factorized as
(44)
(45) In a known way, a N.sub.0 value higher than the actual noise variance can be used in equations (10), (11) to improve the performance of the sub-optimal detector.
(46) The meaning of equation (12)—or of a somehow different expression which could be obtained starting from slightly different assumptions—is that the probability mass function can be expressed by the product of N terms, each associated to a symbol x.sub.k and proportional to the product of an indicator function I.sub.k(σ.sub.k+1, σ.sub.k, x.sub.k), an a priori probability P.sub.k(x.sub.k), a first function F.sub.k(x.sub.k, σ.sub.k) representing the inter-symbol interference due to the Q symbols preceding said symbol x.sub.k and of a second function H.sub.i(x.sub.k, x.sub.k−i) representing the inter-symbol interference due to the (L−Q) previous symbols, i.e. symbols identified by an index “i” taking values comprised between (L+1) and Q.
(47) According to another aspect of the invention, the a posteriori probabilities (APPs) P(x.sub.k|r) that represent the outcome of the algorithm are computed by marginalizing the probability mass function, expressed by (12), by applying the well-known sum-product algorithm (SPA) [31].
(48) It is important to note that the marginalization of (12) required for computing the target APPs of the modulation symbols cannot be exactly carried out by applying the SPA to the FG in
(49) Depending on the value of Q, two extreme scenarios occur. Clearly, when Q=L, the lower part of the FG disappears, the resulting FG is cycle-free and the SPA, which degenerates into the BCJR algorithm, is an exact implementation of the MAP symbol detection algorithm when there are at most L interfering symbols [31]. On the other hand, when Q=0, the upper part of the FG disappears and the graph-based detection algorithm described in [29] is obtained, whose FG has proper factor nodes connecting two interfering symbols given by (11). In this case, the resulting FG has length-six cycles (provided that L≧2) and the computation complexity of the SPA implementation is very limited, since M-ary messages only are propagated in the FG, and the complexity is only linear in L.
(50) Finally, it is to remark that, unlike in the BCJR algorithm, which requires the propagation of M.sup.L-ary messages, the messages over the considered FG are either M-ary (in the lower part of the FG) or M.sup.Q-ary, in the upper part. Hence, it can be stated that the complexity of the proposed framework increases exponentially with the value of Q but only linearly with the value of L−Q, since this value only impacts on the number of edges in the FG, while the function nodes {H.sub.i} are connected with two variable nodes only, irrespectively of the value of L−Q. This is a very significant advantage of the inventive method over the prior art.
(51) As illustrated on
(52) Equations 3-12 only consider lowest-order (i.e. third order) nonlinearity of the satellite transponder. However, taking into account higher-order contributions to the nonlinear response of the transponder (more generally: of the channel) does not pose any fundamental problem. In the case of fifth-order nonlinearity, the signal s(t) at the output of the transponder can be written as:
(53)
(54) The pulse
(55) Detection can be improved without increasing significantly the complexity of the algorithm by using interference cancellation, and preferably soft interference cancellation (SIC), to take into account more than L interfering symbols. Recalling the definitions (7) and (8), it is possible to write:
(56)
(57) where n.sub.k.sup.(1) and n.sub.k.sup.(3) are proper noise samples. It is assumed that, at a given iteration, the equalization algorithm is activated with a set of a priori probabilities, coming from the SISO decoder, equal to {P.sub.k(x.sub.k)}. The algorithm performs SI self-iterations (being SI≧0 a design parameter) proceeding as follows:
(58) 1. iter=0 and the extrinsic probabilities p.sup.(iter)(r|x.sub.k) are initialized to a constant value;
(59) 2. the following a posteriori moments of every code symbol is evaluated according to:
(60)
(61) It should be noted that p.sup.(iter)(r) plays the role of a constant normalization factor, and in fact need not to be evaluated or stored;
(62) 3. the average interference of symbols for |i|>L is removed from all the received samples according to
(63)
(64) 4. The extrinsic probabilities p.sup.(iter+1)(r|x.sub.k) are obtained through one iteration of the detector, with a noise variance for each symbol inflated at each iteration according to the values of V.sub.k.sup.(1) and V.sub.k.sup.(3). Therefore, the noise variance N.sub.0 in equations (10) and (11) is replaced with a time-varying variance (N.sub.0).sub.k=N.sub.0+ƒ(V.sub.k.sup.(1), V.sub.k.sup.(3)), where the function ƒ is properly chosen.
(65) 5. iter=iter+1; if iter<SI (the design parameter SI being the overall number of self-iterations) return to 2, otherwise continue;
(66) 6. the extrinsic probabilities fed to the SISO decoder are {p.sup.(SI)(r|x.sub.k)}.
(67) As illustrated on
(68) The receiver complexity can be reduced for a given performance or the performance improved for a given complexity by adopting the channel shortening technique described in [34], properly extended here to the channel at hand. The channel shortening aims at finding the optimal digital filter (known as “channel shortener”) for the samples at the output of the matched filter, and the optimal coefficients of ISI to be set at detector (known as target response). In other words, given the objective receiver constrained complexity corresponding to a channel memory of L, this technique finds the channel shortener and the target response that maximize the achievable information rate of the detector. In a known way, the detector is designed taking into account the target response instead of the actual response of the channel including the channel shortener; in turn, the target response is chosen in order to maximize the information rate. In general the optimization problem is convex with nonlinear constraints. Thus the solution can be carried out with standard numerical optimization methods with the limit of complexity due to the problem dimensionality. However closed-form expressions can be found, under suitable hypothesis. In [34] the channel shortener and target response expressions are found for the linear channel assuming independent transmitted symbols x.sub.k belonging to a constellation with Gaussian distribution. Although the solution is found for Gaussian symbols, simulation results in [34] show that good improvements are achieved also for low-order discrete constellations, like the PSK modulations.
(69) The framework is generalized here to the nonlinear satellite channel. The sufficient statistics for the nonlinear satellite channel at each time i, is a vector in the form
r.sub.i=(r.sub.i.sup.(1),r.sub.i.sup.(3)).sup.T.
(70) whose elements are given by eq. (7) and (8). Thus, the channel shortener can be in general a two-dimensional digital filter having impulse response {L.sub.i}, where:
(71)
(72) is a proper 2×2 matrix, and the target response are the {tilde over (h)}.sub.i.sup.(1), {tilde over (h)}.sub.i.sup.(1,3), {tilde over (h)}.sub.i.sup.(3) to be set at the detector.
(73) Samples {r.sub.i} can be collected in block vector r=[r.sub.0T, . . . , r.sub.N−1.sup.T].sup.T and we can rewrite the sufficient statistics as
r=Hx+n
(74) where the matrix H is a block Toeplitz matrix whose entries in (i,j) read
(75)
(76) and x and n are block vectors collecting the sequences x.sub.i=[x.sub.i, x.sub.i|x.sub.i|.sup.2].sup.T and the noise samples n.sub.i=[n.sub.i.sup.(1), n.sub.i.sup.(3)].sup.T.
(77) Under the hypothesis that x.sub.i, x.sub.i|x.sub.i|.sup.2 are correlated Gaussian and independent from x.sub.k for any i≠k, the achievable information rate I.sub.R for the detector with complexity L can be carried out in closed form using the approach showed in [34] properly extended to a block Toeplitz channel matrix H.
(78) Namely, it is supposed that:
E{xx.sup.H}=V
(79) where the superscript H means the transpose and conjugate, and V is a block matrix such that:
(80)
(81) where V.sub.d=E{x.sub.ix.sub.i.sup.H} and does not depend on the time i.
(82) The achievable information rate can be found as
I.sub.R=log det({tilde over (H)}V+I)−Tr(LF.sup.H[FVF.sup.H+2N.sub.0I]FL.sup.H[{tilde over (H)}+V.sup.−1].sup.−1)
where F=Chol(H) is the Cholesky factorization of H, and L, {tilde over (H)} are block Toeplitz matrix representing the channel shortener and the target response respectively.
(83) The optimal channel shortener {L.sub.i}, and the target response
(84) Then, assuming an infinite transmission the optimal channel shortener is found in the frequency domain as
L(ω)=[{tilde over (H)}(ω)+V.sub.d.sup.−1]V.sub.dF(ω).sup.H[F(ω)V.sub.dF(ω).sup.H+2N.sub.0I].sup.−1(F(ω).sup.H).sup.−1
where L(ω) is the discrete-time Fourier transform (DTFT) of {L.sub.i}.
(85) The matrices {b.sub.i} with i=0, . . . , L are defined as the inverse discrete-time Fourier transform (iDTFT) of:
B(ω)=V.sub.d−V.sub.aF(ω).sup.H[F(ω)V.sub.dF(ω)H+2N.sub.0I].sup.−1F(ω)V.sub.d,
(86) and b is defined as the block vector
b=[b.sub.1, . . . ,b.sub.L].
(87) Moreover, B is defined as the block Toeplitz matrix whose entries read:
B.sub.ij=b.sub.i−j
and:
c=b.sub.0−b.sup.HB.sup.−1b.
(88) The optimal target response is given by
{tilde over (H)}(ω)=U(ω).sup.HU(ω)−V.sub.d
(89) where U(ω) is the DTFT of a filter {U.sub.i} given by
(90)
(91) Channel Shortening can be employed more in general for a Volterra-series representation up to the n-order, with n odd.
(92) As illustrated on
(93) Until here, only single-user (or single-carrier) receivers have been considered, i.e. inter-carrier interference (ICI) has been neglected. However, the invention also applies to multiuser detection in the single-carrier-per-transponder scenario.
(94) Using the Volterra-series representation up to the third order (generalization to higher orders is straightforward), in the presence of U interfering users, the approximated received signal can be expressed by
(95)
A sufficient statistic for signal (13) can be obtained through a bank of filters matched to the pulses g.sup.(1)(t) and g.sup.(3)(t) and properly centred at each frequency lF.sub.d. At discrete time k, the output of the two filters for user m can be expressed as:
(96)
and (n.sub.k,m.sup.(1), n.sub.k,m.sup.(3)) are coloured circularly-symmetric zero-mean Gaussian random variables. Equations (14) and (15) can be rewritten, for each k and m, in a matrix form as
r=Hx+n
where the matrix H is a block matrix composed of sub-matrices of the form
(97)
and the vectors x, r, n are obtained by the concatenation of the sub-vectors
x.sub.k,l=(x.sub.k,l,x.sub.k,l|x.sub.k,l|.sup.2).sup.T
r.sub.k,l=(r.sub.k,l.sup.(1),r.sub.k,l.sup.(3)).sup.T
n.sub.k,l=(n.sub.k,l.sup.(1),n.sub.k,l.sup.(3)).sup.T
respectively. By introducing the functions
(98)
where σ.sub.k,l=(x.sub.k−1,l, x.sub.k−2,l, . . . , x.sub.k−Q,l), the following factorization of the APP can be obtained:
(99)
(100) The meaning of equation (16)—or of a somehow different expression which could be obtained starting from slightly different assumptions—is that the probability mass function can be expressed by the product of N×U terms, each associated to a symbol x.sub.k,l and proportional to the product of an indicator function I.sub.k,l(x.sub.k,l, σ.sub.k,l, σ.sub.k+1,l), an a priori probability P.sub.k,l(x.sub.k,l), a first function F.sub.k,l(x.sub.k,l, σ.sub.k,l) representing the inter-symbol interference within carrier l due to the Q symbols preceding said symbol x.sub.k,l, of a second function
(101)
(102) representing the inter-symbol interference within carrier l due to the (L−Q) previous symbols and of a third function
(103)
(104) representative of inter-carrier interference.
(105) The factor graph corresponding to equation (16) is represented on
(106) In order to keep maximum advantage of the inventive detector/detecting method, it is advantageous to use an optimized transmission scheme wherein the values of T, F.sub.u, F.sub.d, and the shape of the adopted pulses are chosen in order to maximize the spectral efficiency, thus allowing for ISI and ICI. It can be shown that the problem of determining the optimal pulse shape can be reduced to a finite-dimensional optimization problem, with dimension depending on the channel memory; this is rigorously true in the case of a linear channel, and approximately true for a nonlinear channel. The spectral efficiency measures the amount of information per unit of time and bandwidth and is given by the ratio between the information rate and the product between the symbol time and the occupied bandwidth. The information rate, in bits per channel use, can be computed—for a given detection/decoding scheme—by means of the simulation-based method described in [35]. A further degree of freedom is represented by the bandwidth of the shaping pulse that can be increased, thus increasing the interference for given values of F.sub.u and F.sub.d.
(107) This optimal values of T, F.sub.u, and F.sub.d, and the shape or bandwidth of the pulse p(t) depend on the employed detector—the larger the interference that the receiver can cope with, the larger the spectral efficiency and the lower the values of T, F.sub.u, and F.sub.d. This technique provides increased spectral efficiencies at least for low-order modulation formats. In fact, when dense constellations with shaping [9] are employed, it reduces to a scenario similar to that of the Gaussian channel with Gaussian inputs for which orthogonal signalling is optimal (although this is rigorously true for the linear channel and not in the presence of a nonlinear HPA, since shaping increases the peak-to-average power ratio). Improving the ASE without increasing the constellation order is very convenient since the larger the constellation size, the higher the decoding complexity. Moreover, it is well known that low-order constellations are more robust to channel impairments such as time-varying phase noise and non-linearity.
(108) It is important to point out that there is a major difference with respect to faster-than-Nyquist or its extension to the frequency domain described in [10]. In that case, in fact, time and frequency spacings are chosen as the minimum values ensuring the same performance as in the case of absence of ISI with the optimal receiver. We here use the values corresponding to the maximum value of the spectral efficiency. These values result to be much lower than those adopted in the faster-than-Nyquist technique when applied to the same pulses. In addition, it is also possible to employ the same technique in case of pulses for which exist no values of T and F giving rise to absence of interference.
(109) The technical result of the invention will now be discussed with reference to a specific example illustrated by
(110)
(111)
(112) In both cases the code-frame length is 64,800 bits, the transmit pulses are RRC with roll-of 20%, a DVB-S2-LDPC code is used and the rates are: For the method according to the invention: QPSK: 1/3; 1/2; 3/5 8PSK: 1/2; 3/5; 2/3 16APSK: 2/3; 3/4 32APSK: 2/3; 3/4; 5/6; 8/9 For the method with orthogonal signalling: QPSK: 1/2; 3/5; 3/4 8PSK: 3/5; 3/4; 8/9 16APSK: 3/4; 4/5; 5/6; 8/9 32APSK: 3/4; 4/5; 5/6; 8/9; 9/10.
(113) It can be seen that the present invention allows an increase of about 20% in spectral efficiency.
REFERENCES
(114) [1] ETSI EN 301 307 Digital Video Broadcasting (DVB); V1.1.2 (2006-06), Second generation framing structure, channel coding and modulation systems for Broadcasting, Interactive Services, News Gathering and other Broadband satellite applications, 2006. [2] J. E. Mazo, “Faster-than-Nyquist signaling,” Bell System Tech. J., vol. 54, pp. 1450-1462, October 1975. [3] J. E. Mazo and H. J. Landau, “On the minimum distance problem for faster-than-Nyquist signaling,” IEEE Trans. Inform. Theory, pp. 1420-1427, November 1988. [4] A. Liveris and C. N. Georghiades, “Exploiting faster-than-Nyquist signaling,” IEEE Trans. Commun., pp. 1502-1511, September 2003. [5] F. Rusek and J. B. Anderson, “On information rates of faster than Nyquist signaling,” in Proc. IEEE Global Telecommun. Conf, (San Francisco, Calif., U.S.A.), November 2006. [6] F. Rusek and J. B. Anderson, “Maximal capacity partial response signaling,” in Proc. IEEE Intern. Conf. Commun., pp. 821-826, June 2007. [7] A. Barbieri, D. Fertonani, and G. Colavolpe, “Time-frequency packing for linear modulations: spectral efficiency and practical detection schemes,” IEEE Trans. Commun., vol. 57, pp. 2951-2959, October 2009. [8] A. Modenini, G. Colavolpe, and N. Alagha, “How to significantly improve the spectral efficiency of linear modulations through time-frequency packing and advanced processing” in Proc. IEEE Intern. Conf. Commun., pp. 3299-3303, June 2012. [9] A. R. Calderbank and L. H. Ozarow, “Nonequiprobable signaling on the Gaussian channel,” IEEE Trans. Inform. Theory, vol. 36, pp. 726-740, July 1990. [10] F. Rusek and J. B. Anderson, “The two dimensional Mazo limit,” in Proc. IEEE International Symposium on Information Theory, (Adelaide, Australia), pp. 970-974, November 2005. [11] B. F. Beidas and R. I. Seshadri, “Analysis and compensation for nonlinear interference of two high-order modulation carriers over satellite link,” IEEE Trans. Commun., vol. 58, pp. 1824-1833, June 2010. [12] B. F. Beidas, “Intermodulation distortion in multicarrier satellite systems: analysis and turbo Volterra equalization,” IEEE Trans. Commun., vol. 59, pp. 1580-1590, June 2011. [13] G. Colavolpe and A. Piemontese, “Novel SISO Detection Algorithms for Nonlinear Satellite Channels,” IEEE Wireless Commun. Letters, vol. 1, pp. 22-25, February 2012. [14] S. Benedetto and E. Biglieri, “Nonlinear equalization of digital satellite channels,” IEEE J. Select. Areas Commun., vol. 1, pp. 57-62, January 1983. [15] C. Douillard, M. Jezequel, C. Berrou, A. Picart, P. Didier, and A. Glavieux, “Iterative correction of intersymbol interference: turbo-equalization,” European Trans. Telecommun., vol. 6, pp. 507-511, September/October 1995. [16] M. Tüchler, R. Koetter, and A. C. Singer, “Turbo equalization: Principles and new results,” IEEE Trans. Commun., vol. 55, pp. 754-767, May 2002. [17] M. Tüchler, A. C. Singer, and R. Koetter, “Minimum mean square error equalization using a priori information,” IEEE Trans. Signal Processing, vol. 50, pp. 673-683, March 2002. [18] G. Colavolpe, A. Barbieri, and G. Caire, “Algorithms for iterative decoding in the presence of strong phase noise,” IEEE J. Select. Areas Commun., vol. 23, pp. 1748-1757, September 2005. [19] G. D. Forney, Jr., “Maximum-likelihood sequence estimation of digital sequences in the presence of intersymbol interference,” IEEE Trans. Inform. Theory, vol. 18, pp. 284-287, May 1972. [20] G. Ungerboeck, “Adaptive maximum likelihood receiver for carrier-modulated data-transmission systems,” IEEE Trans. Commun., vol. com-22, pp. 624-636, May 1974. [21] L. R. Bahl, J. Cocke, F. Jelinek, and J. Raviv, “Optimal decoding of linear codes for minimizing symbol error rate,” IEEE Trans. Inform. Theory, vol. 20, pp. 284-287, March 1974. [22] G. Colavolpe and A. Barbieri, “On MAP symbol detection for ISI channels using the Ungerboeck observation model,” IEEE Commun. Letters, vol. 9, pp. 720-722, August 2005. [23] G. Colavolpe, G. Ferrari, and R. Raheli, “Reduced-state BCJR-type algorithms,” IEEE J. Select. Areas Commun., vol. 19, pp. 848-859, May 2001. [24] D. Fertonani, A. Barbieri, and G. Colavolpe, “Reduced-complexity BCJR algorithm for turbo equalization,” IEEE Trans. Commun., vol. 55, pp. 2279-2287, December 2007. [25] F. Rusek, M. Loncar, and A. Prlja, “A comparison of Ungerboeck and Forney models for reduced-complexity ISI equalization,” in Proc. IEEE Global Telecommun. Conf., (Washington, D.C., U.S.A.), November 2007. [26] X. Wang and H. V. Poor, “Iterative (turbo) soft interference cancellation and decoding for coded CDMA,” IEEE Trans. Commun., vol. 47, pp. 1046-1061, July 1999. [27] H. El Gamal and E. Geraniotis, “Iterative multiuser detection for coded CDMA signals in AWGN and fading channels,” IEEE J. Select. Areas Commun., vol. 18, pp. 30-41, January 2000. [28] D. Fertonani, A. Barbieri, and G. Colavolpe, “Novel graph-based algorithms for soft-output detection over dispersive channels,” in Proc. IEEE Global Telecommun. Conf., (New Orleans, La., USA), November-December 2008. [29]G. Colavolpe, D. Fertonani, and A. Piemontese, “SISO detection over linear channels with linear complexity in the number of interferers,” IEEE J. of Sel. Topics in Signal Proc., vol. 5, pp. 1475-1485, December 2011. [30] J. G. Proakis, Digital Communications. New York: McGraw-Hill, 4th ed., 2001. [31] F. R. Kschischang, B. J. Frey, and H.-A. Loeliger, “Factor graphs and the sum-product algorithm,” IEEE Trans. Inform. Theory, vol. 47, pp. 498-519, February 2001. [32] T. Richardson and R. Urbanke, “The capacity of low density parity check codes under message passing decoding,” IEEE Trans. Inform. Theory, vol. 47, pp. 599-618, February 2001. [33] G. Colavolpe and G. Germi, “On the application of factor graphs and the sum-product algorithm to ISI channels,” IEEE Trans. Commun., vol. 53, pp. 818-825, May 2005. [34] F. Rusek and A. Prlja, “Optimal channel shortening for MIMO and ISI channels,” IEEE Trans. Wireless Commun., vol. 11, pp. 810-818, February 2012. [35] D. M. Arnold, H.-A. Loeliger, P. O. Vontobel, A. Kav{hacek over (c)}ić, and W. Zeng, “Simulation-based computation of information rates for channels with memory,” IEEE Trans. Inf. Theory, vol. 52, pp. 3498-3508, August 2006.